After a user has been authenticated, sensitive data can be encrypted to prevent eavesdropping (see cryptography). THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction requires permission.